Proposal for Identification Scheme of Driver and Impostor based on Acceleration Data

Author(s):  
Yuki Mori ◽  
Ryota Ono ◽  
Takuya Mitani ◽  
Katsuhiro Naito ◽  
Takaya Yamazato
1981 ◽  
Vol 9 (1) ◽  
pp. 19-25 ◽  
Author(s):  
G. S. Ludwig ◽  
F. C. Brenner

Abstract Belted bias and radial Course Monitoring Tires were run over the National Highway Traffic Safety Administration tread wear course at San Angelo on a vehicle instrumented to measure lateral and longitudinal accelerations, speed, and number of wheel rotations. The data were recorded as histograms. The distribution of speed, the distributions of lateral and longitudinal acceleration, and the number of acceleration level crossings are given. Acceleration data for segments of the course are also given.


2009 ◽  
Vol 29 (7) ◽  
pp. 1779-1781
Author(s):  
Lian-hao LIU ◽  
Bu-yun QU

2015 ◽  
Vol 3 (2) ◽  
Author(s):  
Reza Alimoradi

The goal of an identification procedure is access control. Methods that permit an identification are called identification protocols. In this paper, first we introduced quaternion numbers. In addition we proposed a new identification scheme based on quaternions. Finally, the security of our scheme is analyzed.


Author(s):  
Ivan V. Belov ◽  
Roman V. Shalymov ◽  
Anna N. Tkachenko ◽  
Daniil Yu. Larionov ◽  
Liudmila N. Podgornaya
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document